Feeds

Porno blog spam turns nasty

Smut attack via compromised military proxies

  • alert
  • submit to reddit

Securing Web Applications Made Simple and Scalable

Blog spamming is turning nasty. First spotted approximately a year ago, blog spam involves the automated posting of Web address onto weblogs or online discussion boards.

Spam comments deposited using the technique include a link to a spamvertised website. The idea is not so much to get visitors to a spammed location to visit the promoted site but to increase its page rankings in Google. This, in turn, increases the prominence of the site in certain searches and therefore increases the likelihood that more visitors will visit a site. That's the theory anyway.

This nasty side-effect of the chronic interlinking of blogspace as interpreted by Google's PageRank algorithm has thus far been used to promote the usual Viagra sites, mortgage and Internet gaming sites. Blog writers have fought back by using anti-spam plug-ins blogging software. This has helped but it hasn't got rid of the problem.

Over recent months, regular email spammers have used networks of compromised machines to disseminate spam. Now we're starting to see the first evidence of blog spam been sent through compromised machines in order to promote illegal porn sites.

Last week spam advertising of "incest, rape and animal sex" pornography was posted on a web log which was set up to discuss the Draft ID Cards Bill. Mark, a prominent member of London 2600, and the person who runs the Watching Them, Watching Us site, was able to see that the offending post came from an open proxy on an unclassified military network. A number of other attacks apparently from the same address had also been tried. Mark was able to further trace the IP address of the apparent source of these spam attacks back to US hosting firm 3fn.net.

"I have other log file entries which show the pattern of illegal porn blog spam attacks from the same IP address, some through other open proxy servers," Mark writes. "At a guess the US military Internet gateways are members of a proxy chain, and it is some internal machine or machines which have either been compromised, or which are internet accessible and acting as open proxy servers via the gateways. Neither of these scenarios should be tolerated."

"No doubt 3fn.net will wish to cooperate with any investigation by the UK National High Tech Crime Unit to determine if its Apache web server [name supplied] has been compromised, or if it is only a link in a chain of compromised systems, or if customers or staff of 3fn.net are responsible."

Mark forwarded an email complaining about the problem to the US Military, 3fn.net and UK's National High Tech Crime Unit last week. The NHTCU has read his email and he's had a response for one of the techies at 3fn.net, who said he was looking into the problem. Mark has received nothing back from the US military.

3fn.net is yet to respond to our request for comment on the progress of this investigation. ®

Related stories

Google bug blocks thousands of sites
Google to fix blog noise problem
Google explains new page rankings
Phatbot arrest throws open trade in zombie PCs
The illicit trade in compromised PCs

Related links

Blog Aggregator software is prone to the same kinds of cross site scripting attacks as sometimes affect web browser software. A useful RSS feed to check on a dozen or so security holes in Blog Aggregator software is here. A popular anti-spam add-on to Movable Type blogging software is MT-Blacklist

.

Mobile application security vulnerability report

More from The Register

next story
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
NUDE SNAPS AGENCY: NSA bods love 'showing off your saucy selfies'
Swapping other people's sexts is a fringe benefit, says Snowden
Own a Cisco modem or wireless gateway? It might be owned by someone else, too
Remote code exec in HTTP server hands kit to bad guys
British data cops: We need greater powers and more money
You want data butt kicking, we need bigger boots - ICO
Crooks fling banking Trojan at Japanese smut site fans
Wait - they're doing online banking with an unpatched Windows PC?
NIST told to grow a pair and kick NSA to the curb
Lrn2crypto, oversight panel tells US govt's algorithm bods
prev story

Whitepapers

Reducing security risks from open source software
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.